Skip to Main content Skip to Navigation

Search by documents



hal-01083544v1  Journal articles
Linda ZeghacheNadjib BadacheMichel HurfinIzabela Moise. Reliable mobile agents with transactional behaviour
International journal of communication networks and distributed systems, Inderscience Publishers, 2014, 13 (1), pp.27. ⟨10.1504/IJCNDS.2014.063977⟩
hal-00763197v1  Conference papers
Linda ZeghacheNadjib BadacheMichel HurfinIzabela Moise. Providing Reliability for transactional mobile agents
5th International Conference on Advanced Infocomm Technology, IEEE, Jul 2012, Paris, France. pp.177-190, ⟨10.1007/978-3-642-38227-7_21⟩
...
hal-02363431v1  Conference papers
Charles XosanavongsaEric TotelOlivier Bettan. Discovering Correlations: A Formal Definition of Causal Dependency Among Heterogeneous Events
EuroS&P 2019 : 4th IEEE European Symposium on Security and Privacy, Jun 2019, Stockholm, Sweden. pp.340-355, ⟨10.1109/EuroSP.2019.00033⟩
...
hal-02988140v1  Directions of work or proceedings
Steffen WendzelLuca CaviglioneAlessandro CheccoAleksandra MilevaJean-François Lalande et al.  Information Security Methodology, Replication Studies and Information Security Education
Journal of Universal Computer Science, 26 (7), pp.762-763, 2020, Special issue of Journal of Universal Computer Science
...
hal-02018168v1  Journal articles
Yuting WangPierre WilkeZhong Shao. An abstract stack based approach to verified compositional compilation to machine code
Proceedings of the ACM on Programming Languages, ACM, 2019, 3 (62), pp.30. ⟨10.1145/3290375⟩
...
hal-03114583v1  Conference papers
Yuting WangXiangzhen XuPierre WilkeZhong Shao. CompCertELF: Verified Separate Compilation of C Programs into ELF Object Files
PACMPL 2020 - Proceedings of the ACM on Programming Languages, Nov 2020, Chicago, United States. pp.1-28
...
hal-01558473v1  Conference papers
Muhammad Abdul WahabPascal CotretMounir Nasr AllahGuillaume HietVianney Lapotre et al.  ARMHEx: A hardware extension for DIFT on ARM-based SoCs
2017 27th International Conference on Field Programmable Logic and Applications (FPL), Sep 2017, Ghent, Belgium. ⟨10.23919/fpl.2017.8056767⟩
...
hal-01558475v1  Poster communications
Muhammad Abdul WahabPascal CotretMounir Nasr AllahGuillaume HietVianney Lapotre et al.  ARMHEx: a framework for efficient DIFT in real-world SoCs
Field Programmable Logic (FPL), Sep 2017, Ghent, Belgium. 2017
...
hal-01558155v1  Conference papers
Muhammad Abdul WahabPascal CotretMounir Nasr AllahGuillaume HietVianney Lapotre et al.  ARMHEx: embedded security through hardware-enhanced information flow tracking
RESSI 2017 : Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2017, Grenoble (Autrans), France
...
tel-01342243v1  Habilitation à diriger des recherches
Valérie Viet Triem Tong. Apport du suivi de flux d'information pour la sécurité des systèmes
Cryptographie et sécurité [cs.CR]. Université Rennes 1, 2015
...
hal-01535678v1  Conference papers
Valérie Viet Triem TongAurélien TrullaMourad LeslousJean-François Lalande. Information flows at OS level unmask sophisticated Android malware
14th International Conference on Security and Cryptography, Jul 2017, Madrid, Spain. pp.578-585, ⟨10.5220/0006476705780585⟩
...
hal-02288116v1  Conference papers
Valérie Viet Triem TongCédric HerzogTomás Concepción MirandaPierre GrauxJean-François Lalande et al.  Isolating malicious code in Android malware in the wild
MALCON 2019 - 14th International Conference on Malicious and Unwanted Software, Oct 2019, Nantucket, United States
hal-00656933v1  Conference papers
Valérie Viet Triem TongRadoniaina AndriatsimandefitraStéphane GellerSimon BocheFrédéric Tronel et al.  Mise en œuvre de politiques de protection des flux d'information dans l'environnement Android
Computer & Electronics Security Applications Rendez-vous (C&ESAR 2011), Nov 2011, Rennes, France
...
hal-01355122v1  Journal articles
Valérie Viet Triem TongJean-François LalandeMourad Leslous. Challenges in Android Malware Analysis
ERCIM News, ERCIM, 2016, Special Theme: Cybersecurity, pp.42-43
hal-01334608v1  Conference papers
Eric TotelMouna HkimiMichel HurfinMourad LeslousYvan Labiche. Anomaly Based Intrusion Detection in Distributed Applications without global clock
SEC2 2016 - Deuxième atelier sur la Sécurité dans les Clouds, Jul 2016, Lorient, France
...
tel-00763746v1  Habilitation à diriger des recherches
Eric Totel. Techniques de détection d'erreur appliquées à la détection d'intrusion
Cryptographie et sécurité [cs.CR]. Université Rennes 1, 2012
hal-00870800v1  Conference papers
Karim TabiaPhilippe LerayLudovic Mé. From redundant/irrelevant alert elimination to handling idss' reliability and controlling severe attack prediction/false alarm rate tradeoffs
5th Conference on Network and Information Systems Security (SARSSI'10), 2010, Rocquebrune Cap-Martin, France
hal-01344565v1  Conference papers
Deepak SubramanianGuillaume HietChristophe Bidan. Preventive Information Flow Control through a Mechanism of Split Addresses
9th International Conference on Security of Information and Networks (SIN 2016), Jul 2016, Newark, United States. p.1-8, ⟨10.1145/2947626.2947645⟩
hal-01344563v1  Conference papers
Deepak SubramanianGuillaume HietChristophe Bidan. Preventive Information Flow Control through a Mechanism of Split Addresses
9ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information, May 2014, Saint-Germain-Au-Mont-d'Or, France
...
hal-01398192v1  Conference papers
Deepak SubramanianGuillaume HietChristophe Bidan. A self-correcting information flow control model for the web-browser
FPS 2016 - The 9th International Symposium on Foundations & Practice of Security, Oct 2016, Québec City, Canada. pp.285-301, ⟨10.1007/978-3-319-51966-1_19⟩
...
hal-03043681v1  Conference papers
Geoffrey SaunoisFrédérique RobinEmmanuelle AnceaumeBruno Sericola. Permissionless Consensus based on Proof-of-Eligibility
NCA 2020 - 19th IEEE International Symposium on Network Computing and Applications, Nov 2020, Boston (virtual venue), United States